I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

PowerPoint Slideshow about '1 citizen portfolio' - haracha

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

The e-Literate module provides an introduction to 21st century global digital technology. It explains the capabilities to use digital technology and knowing when, when not and how to use it. It stresses on the ethics, process of learning about technology and the uses of technology.

"Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.

Cyber stalking is the use of the Internet or any electronic device to stalk other people. Cyber stalkers find information on their victims from various sources such as blogs, search services, and social networking websites.

Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials.

You may want to consider blocking or filtering messages from the harasser. Many email programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete emails from a particular email address or contain offensive words. Chat room contact can be blocked as well.

Every keystroke of every email, every IM, everything said or done on the web or in email is recorded somewhere.

6. Practise safe access

Be careful opening any email attachments. This is especially true if you do not know the sender, but even if you do, it is possible for malware to fake email address or even steal them from computer and send them out without the owner knowing.